Soumettre la recherche
Mettre en ligne
Open source security
•
Télécharger en tant que PPTX, PDF
•
1 j'aime
•
1,646 vues
L
lrigknat
Suivre
Technologie
Affichage du diaporama
Signaler
Partager
Affichage du diaporama
Signaler
Partager
1 sur 24
Télécharger maintenant
Recommandé
Owasp Top 10 - A1 Injection
Owasp Top 10 - A1 Injection
Paul Ionescu
PSConfEU - Building an Empire with PowerShell
PSConfEU - Building an Empire with PowerShell
Will Schroeder
Adventures in Asymmetric Warfare
Adventures in Asymmetric Warfare
Will Schroeder
So you want to be a security expert
So you want to be a security expert
Royce Davis
Html5 hacking
Html5 hacking
Iftach Ian Amit
I Hunt Sys Admins
I Hunt Sys Admins
Will Schroeder
Jwt == insecurity?
Jwt == insecurity?
snyff
Bridging the Gap
Bridging the Gap
Will Schroeder
Recommandé
Owasp Top 10 - A1 Injection
Owasp Top 10 - A1 Injection
Paul Ionescu
PSConfEU - Building an Empire with PowerShell
PSConfEU - Building an Empire with PowerShell
Will Schroeder
Adventures in Asymmetric Warfare
Adventures in Asymmetric Warfare
Will Schroeder
So you want to be a security expert
So you want to be a security expert
Royce Davis
Html5 hacking
Html5 hacking
Iftach Ian Amit
I Hunt Sys Admins
I Hunt Sys Admins
Will Schroeder
Jwt == insecurity?
Jwt == insecurity?
snyff
Bridging the Gap
Bridging the Gap
Will Schroeder
PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)
Will Schroeder
XSS Magic tricks
XSS Magic tricks
GarethHeyes
Catch Me If You Can: PowerShell Red vs Blue
Catch Me If You Can: PowerShell Red vs Blue
Will Schroeder
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Andy Robbins
Ruxmon cve 2012-2661
Ruxmon cve 2012-2661
snyff
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
Mohammed ALDOUB
The Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to Compromise
Will Schroeder
The Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active Directory
Will Schroeder
I hunt sys admins 2.0
I hunt sys admins 2.0
Will Schroeder
I Have the Power(View)
I Have the Power(View)
Will Schroeder
Finding Needles in Haystacks
Finding Needles in Haystacks
snyff
JWT: jku x5u
JWT: jku x5u
snyff
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
Will Schroeder
Trusts You Might Have Missed
Trusts You Might Have Missed
Will Schroeder
Defcon CTF quals
Defcon CTF quals
snyff
A Year in the Empire
A Year in the Empire
Will Schroeder
Cassandra and security
Cassandra and security
Ben Bromhead
How to discover 1352 Wordpress plugin 0days in one hour (not really)
How to discover 1352 Wordpress plugin 0days in one hour (not really)
Larry Cashdollar
Securing Cassandra The Right Way
Securing Cassandra The Right Way
DataStax Academy
Ruxmon feb 2013 what happened to rails
Ruxmon feb 2013 what happened to rails
snyff
Open Source for Cyber Security
Open Source for Cyber Security
Prabath Siriwardena
(In)security in Open Source
(In)security in Open Source
Shane Coughlan
Contenu connexe
Tendances
PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)
Will Schroeder
XSS Magic tricks
XSS Magic tricks
GarethHeyes
Catch Me If You Can: PowerShell Red vs Blue
Catch Me If You Can: PowerShell Red vs Blue
Will Schroeder
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Andy Robbins
Ruxmon cve 2012-2661
Ruxmon cve 2012-2661
snyff
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
Mohammed ALDOUB
The Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to Compromise
Will Schroeder
The Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active Directory
Will Schroeder
I hunt sys admins 2.0
I hunt sys admins 2.0
Will Schroeder
I Have the Power(View)
I Have the Power(View)
Will Schroeder
Finding Needles in Haystacks
Finding Needles in Haystacks
snyff
JWT: jku x5u
JWT: jku x5u
snyff
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
Will Schroeder
Trusts You Might Have Missed
Trusts You Might Have Missed
Will Schroeder
Defcon CTF quals
Defcon CTF quals
snyff
A Year in the Empire
A Year in the Empire
Will Schroeder
Cassandra and security
Cassandra and security
Ben Bromhead
How to discover 1352 Wordpress plugin 0days in one hour (not really)
How to discover 1352 Wordpress plugin 0days in one hour (not really)
Larry Cashdollar
Securing Cassandra The Right Way
Securing Cassandra The Right Way
DataStax Academy
Ruxmon feb 2013 what happened to rails
Ruxmon feb 2013 what happened to rails
snyff
Tendances
(20)
PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)
XSS Magic tricks
XSS Magic tricks
Catch Me If You Can: PowerShell Red vs Blue
Catch Me If You Can: PowerShell Red vs Blue
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Ruxmon cve 2012-2661
Ruxmon cve 2012-2661
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
The Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to Compromise
The Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active Directory
I hunt sys admins 2.0
I hunt sys admins 2.0
I Have the Power(View)
I Have the Power(View)
Finding Needles in Haystacks
Finding Needles in Haystacks
JWT: jku x5u
JWT: jku x5u
A Case Study in Attacking KeePass
A Case Study in Attacking KeePass
Trusts You Might Have Missed
Trusts You Might Have Missed
Defcon CTF quals
Defcon CTF quals
A Year in the Empire
A Year in the Empire
Cassandra and security
Cassandra and security
How to discover 1352 Wordpress plugin 0days in one hour (not really)
How to discover 1352 Wordpress plugin 0days in one hour (not really)
Securing Cassandra The Right Way
Securing Cassandra The Right Way
Ruxmon feb 2013 what happened to rails
Ruxmon feb 2013 what happened to rails
En vedette
Open Source for Cyber Security
Open Source for Cyber Security
Prabath Siriwardena
(In)security in Open Source
(In)security in Open Source
Shane Coughlan
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Great Wide Open
Open Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and Security
Joshua L. Davis
Web Summit 2015 - Enterprise stage - Cloud, Open-Source, Security
Web Summit 2015 - Enterprise stage - Cloud, Open-Source, Security
Diogo Mónica
Application Security in the Age of Open Source
Application Security in the Age of Open Source
Black Duck by Synopsys
Open Source Security
Open Source Security
Sander Temme
Open Source in Application Security
Open Source in Application Security
Black Duck by Synopsys
RFID security ppt
RFID security ppt
Sandeep Singh
Power Point Presentation on Open Source Software
Power Point Presentation on Open Source Software
opensourceacademy
Open Source Software Presentation
Open Source Software Presentation
Henry Briggs
Open source technology
Open source technology
aparnaz1
OPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATION
Ritwick Halder
Open Source Technology
Open Source Technology
priyadharshini murugan
En vedette
(14)
Open Source for Cyber Security
Open Source for Cyber Security
(In)security in Open Source
(In)security in Open Source
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and Security
Web Summit 2015 - Enterprise stage - Cloud, Open-Source, Security
Web Summit 2015 - Enterprise stage - Cloud, Open-Source, Security
Application Security in the Age of Open Source
Application Security in the Age of Open Source
Open Source Security
Open Source Security
Open Source in Application Security
Open Source in Application Security
RFID security ppt
RFID security ppt
Power Point Presentation on Open Source Software
Power Point Presentation on Open Source Software
Open Source Software Presentation
Open Source Software Presentation
Open source technology
Open source technology
OPEN SOURCE SEMINAR PRESENTATION
OPEN SOURCE SEMINAR PRESENTATION
Open Source Technology
Open Source Technology
Similaire à Open source security
null Bangalore meet - Php Security
null Bangalore meet - Php Security
n|u - The Open Security Community
Browser Security 101
Browser Security 101
Stormpath
Hacking sites for fun and profit
Hacking sites for fun and profit
David Stockton
How to secure your web applications with NGINX
How to secure your web applications with NGINX
Wallarm
Hacking sites for fun and profit
Hacking sites for fun and profit
David Stockton
Confidence web
Confidence web
Dan Kaminsky
Building Secure User Interfaces With JWTs (JSON Web Tokens)
Building Secure User Interfaces With JWTs (JSON Web Tokens)
Stormpath
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
nooralmousa
Web Hacking Series Part 4
Web Hacking Series Part 4
Aditya Kamat
Best Practices for WordPress in Enterprise
Best Practices for WordPress in Enterprise
Taylor Lovett
Best practices-wordpress-enterprise
Best practices-wordpress-enterprise
Taylor Lovett
Secure WordPress Development Practices
Secure WordPress Development Practices
Brandon Dove
How to Destroy a Database
How to Destroy a Database
John Ashmead
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
Jeremiah Grossman
Postcards from the post xss world- content exfiltration null
Postcards from the post xss world- content exfiltration null
Piyush Pattanayak
Cm9 secure code_training_1day_input sanitization
Cm9 secure code_training_1day_input sanitization
dcervigni
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
Brian Huff
Best Practices for WordPress
Best Practices for WordPress
Taylor Lovett
Web security for app developers
Web security for app developers
Pablo Gazmuri
Django (Web Applications that are Secure by Default )